175 years of Springer publishing +++ Through June 30: 50% off Physics & Astronomy Books

Lecture Notes in Computer Science

Information and Communications Security

5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

Editors: Perner, Petra, Gollmann, Dieter, Zhou, Jianying (Eds.)

Buy this book

eBook $99.00
price for USA (gross)
  • ISBN 978-3-540-39927-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA
  • ISBN 978-3-540-20150-2
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.

Table of contents (37 chapters)

  • A Fast Square Root Computation Using the Frobenius Mapping

    Feng, Wang (et al.)

    Pages 1-10

  • A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

    Duc, Dang Nguyen (et al.)

    Pages 11-21

  • Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents

    Wang, Yan (et al.)

    Pages 22-33

  • On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST

    Wong, Duncan S. (et al.)

    Pages 34-46

  • A Policy Based Framework for Access Control

    Nabhen, Ricardo (et al.)

    Pages 47-59

Buy this book

eBook $99.00
price for USA (gross)
  • ISBN 978-3-540-39927-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA
  • ISBN 978-3-540-20150-2
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information and Communications Security
Book Subtitle
5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings
Editors
  • Petra Perner
  • Dieter Gollmann
  • Jianying Zhou
Series Title
Lecture Notes in Computer Science
Series Volume
2836
Copyright
2003
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-39927-8
DOI
10.1007/b13930
Softcover ISBN
978-3-540-20150-2
Series ISSN
0302-9743
Edition Number
1
Number of Pages
X, 418
Topics